WAPI certificate identification method
A technology for certificates and authentication requests, applied in user identity/authority verification, public key for secure communication, data exchange through path configuration, etc., can solve problems such as weak computing power, low protocol operation efficiency, and low protocol operation efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] The specific flow of the WAPI certificate identification method of the present invention is as follows:
[0020] 1) When the authentication requester entity associates or re-associates with the authenticator entity, the authenticator entity sends an authentication activation packet to the authentication requester entity, and the authentication activation packet includes an authentication identifier;
[0021] 2) After the authentication requester entity receives the authentication activation packet, it sends an access authentication request packet to the authenticator entity, and the access authentication request packet includes the authentication identifier, the temporary public key of the authentication requester entity, and the certificate of the authentication requester entity and the signature of all the aforementioned fields by the authentication requesting entity using the long-term private key;
[0022] 3) After the authenticator entity receives the access authen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More